Bitcoin and Crytpo Currencies, Presented by Fiserv and ACFCS
ACFCS CSC Webinar Final 3-21-14
-
Upload
aceds -
Category
Technology
-
view
237 -
download
2
description
Transcript of ACFCS CSC Webinar Final 3-21-14
Navigating the Cybersecurity Minefield
Confronting the risks of data breaches, organized cybercrime, virtual currencies and more
Presented byTom Patterson
Sam Visner
ACFCS Webinar March 21, 2014
Certification, Training, Networking, News, Guidance
The Mark of Financial Crime Knowledge and Skill
Director, Cybersecurity ConsultingCSC
San Francisco
Tom Patterson
VP and General Manager, Global CybersecurityCSC
Washington, DC
Sam Visner
CYBERSECURITY CLIENTS AROUND THE GLOBE250+
GLOBAL ALLIANCE PARTNERS PROVIDING SECURITY EXPERTISE
15+
INTEGRATED GLOBAL SECURITY OPERATIONS CENTERS5+
YEARS PROVIDING CYBERSECURITY SERVICES35+
GLOBAL CYBERSECURITY PROFESSIONALS1900+
Who We Are
STRATEGIC
TECHNICAL
IDENTITY
ATD
GRC
APPS
SIEM
CONSULT
MANAGE
EMERGENCY
RETAINED
RESPOND
Cybersecurity
Portfolio
Trusted PartnerTargeted DefenseOperational EfficiencyComplete PortfolioGlobal FootprintIndustry Expertise
IT ModelChanged
TighterRegulations
Everything’sConnected
EscalatingThreats
Security MUST Evolve
Credit: Symantec
The Current Face of Advanced Persistent Threats (APT)
ReconInfiltrate
MapEscalate
CustomizeHumanMorphic
CollectExfiltrate/Attack
Hide
APT Stages
Credit: Symantec
The Cyber Impact of Crypto Currencies
ForeignIntelligence
ServicesOrganized
Crime
Non-StateActivists
GlobalTerrorists
WHO? External Threats
GANGS
Thieves
So, What’s an Executive to Do?
Triple S + R TSeparation (Risk | Compliance)
Supply Chain (Your Problem Now)Segmentation (Assume They are Inside)
Response (Planning + People)Technology (Your Ever Evolving Friend)
Cybersecurity Trends to Monitor CIP in the Financial Sector
--EO 13636
MSSPs for 'normal' events, tiger teams for incident response
Mobile device Payments
TOR Exchanges selling your stuff (LSO)
Supply Chain Security
Hottest Trends in Security Become PRO-Active
Situational AwarenessStrategic Planning
Automate for Speed & Efficiency Best TechnologyCentrally Managed
Eco-System SecurityBrands at Risk no matter Who’s at FaultIncludes All Partners
Recover GracefullyPlan Response AheadCustomize Each Event
Questions?